top of page



Jan 11, 20244 min read
Main Cybersecurity Trends in 2024: Imperatives for Business Resilience
Vladimir Boianji, ISSP Enterprise Solutions Director, adeptly delineates the primary cybersecurity trends that organizations should...


Sep 22, 20232 min read
Choosing the Right Managed Security Service: Threat Hunting vs Incident Detection
In today's rapidly evolving digital landscape, ensuring the security of your organization's data and assets is paramount. Managed...


Jul 26, 20233 min read
Minimizing Data Leak Risks: Essential Recommendations for Every Company
Vladimir Boianji, ISSP Enterprise Solutions Director, expertly outlines the essential steps an organization must take during a data...


Apr 13, 20234 min read
Threat Hunting & Anomaly Detection solution: Protecting your business from cyber threats
Threat Hunting & Anomaly Detection from ISSP offers comprehensive cybersecurity solutions, including continuous monitoring of your system...


Jan 31, 20233 min read
Five trends in cybersecurity that your organization needs to care of in 2023
As the cybersecurity landscape continues to evolve, it's important for organizations and businesses to keep up with the latest trends in...


Oct 28, 20225 min read
Social engineering attacks: practical tips to protect your networks and digital assets
Social engineering is, in a certain sense, the “hacking” of a person, as a result of which he/she reacts to manipulation


Jul 31, 20221 min read
ISSP is expanding a partnership with IBM Security
ISSP is expanding a partnership with IBM Security


May 3, 20213 min read
3 Reasons You Can’t Fully Trust Your Security Tools And What You Can Do About It
3 Reasons You Can’t Fully Trust Your Security Tools And What You Can Do About It


Jan 11, 20215 min read
Three trends in cybersecurity in 2021
Among all types of organizations, banks have been and remain the first in matters of information and cybersecurity, using ever newer...


Nov 30, 20202 min read
What if some of your computers survive a cyberattack?
Imagine that your organization becomes the victim of a cyberattack that paralyzes your information systems. Your IT and security...


Mar 19, 20202 min read
ISSP Continues Operations in Face of COVID-19 Epidemic
ISSP Continues Operations in Face of COVID-19 Epidemic
bottom of page